File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -122,6 +122,8 @@ and attack results will be produced in `./results/<DEFENSE_METHOD>_<ATTACK_METHO
122122For more information, you can read [ here] ( ./defense_scripts/README.md ) .
123123
124124## 📔 Citation
125+ ** If you find our work helpful for your research, please kindly cite our paper:**
126+ ```
125127@misc{fang2024privacy,
126128 title={Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses},
127129 author={Hao Fang and Yixiang Qiu and Hongyao Yu and Wenbo Yu and Jiawei Kong and Baoli Chong and Bin Chen and Xuan Wang and Shu-Tao Xia},
@@ -130,6 +132,7 @@ For more information, you can read [here](./defense_scripts/README.md).
130132 archivePrefix={arXiv},
131133 primaryClass={cs.CV}
132134}
135+ ```
133136
134137## :sparkles : Acknowledgement
135138We express great gratitude for all the researchers' contributions to the ** Model Inversion** community.
You can’t perform that action at this time.
0 commit comments